This is intended to be a comprehensive listing of applications used with
I2P. If you know of something that's missing please submit a ticket on
Trac, and be sure to select the
“www” component in the submission form.

Supported applications are tagged with one or more of the following:

bundled

Bundled application — I2P ships with a few officially
supported applications that let new users take immediate advantage of
some of I2P's more useful capabilities.

plugin

Third-party plugin — I2P's plugin system provides convenient
deployment of I2P-enabled applications and allows tighter integration
with the router. Plugins are [reviewed by the community](http://plugins.i2p.xyz) to identify security and
anonymity issues.

standalone, standalone/mod

Third-party standalone application — Many standard network
applications only require careful setup and configuration to communicate
anonymously over I2P. These are tagged with standalone. Some
applications, tagged with standalone/mod, require patching to
function properly over I2P or to prevent inadvertent disclosure of
identifying information such as the user's hostname or external IP
address.

servizio

Third-party essential network service — Services which on
the I2P network are analogous to those provided on the public Internet
by hosting providers, ISPs, and Google: eepsite indexes and jump
services, search engines, email, DNS-style name services, hosting,
proxies, etc. These services focus on boosting the usefulness of the
network as a whole, and making network content more discoverable.

non mantenuto

Unmaintained — This is used to tag plugins, applications,
and services which appear to be unmaintained and may be removed from
this listing in the future.

Warning: Using an application, plugin, or service with I2P
doesn't automatically protect your anonymity. I2P is merely a set of tools
which can help you mitigate certain identified
threats to anonymity. We do not and cannot make any guarantees about the
safety of the applications, plugins, and services listed below. Most
applications and plugins must be properly configured, and some will need to
be patched — and even then your anonymity might not be assured. Similarly,
services could put your anonymity at risk, either by design or through
carelessness on their part or your own.

If you have doubts about the suitability of an application,
plugin, or service for use with I2P, you are urged to inquire about privacy
issues with its maintainers, to search its mailing lists and bug tracker if
one exists, and consult trusted, knowledgeable members of the I2P
community.

Take responsibility for your own anonymity and safety — always
seek expert advice, educate yourself, practice good judgment, be mindful of
disclosing personally identifying information, and don't take
shortcuts.

susidns —
Provides management of addressbooks, which are part of a simple,
user-controlled I2P naming system somewhat
analogous to the Internet's Domain Name System (DNS). Addressbooks map
Base64 destinations to short, usually human-readable “domain” names ending
with a .i2p suffix which the I2P router's HTTP client can resolve back to
Base64 addresses. (Note: While Base64 destinations are globally
unique, addressbook “domain” names only resolve to unique destinations
locally.)
[bundled]

Postman's anonymous email service —
Provides email service within the I2P network via @mail.i2p addresses,
and email gateway service between the I2P network and the public Internet
via @i2pmail.org addresses. One of the oldest continuous services on I2P.
[servizio]

Robert —
A fork of rufus that uses the Basic Open Bridge (BOB) and has many
improvements, including using the latest wxwidgets and python. It also
supports use of seedless if installed for trackerless torrents and
magnet-link like fetching of torrents within I2P.
[standalone]

Many IRC clients leak identifying information to servers or other
clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound
and outbound messages to scrub data such as LAN IP addresses, external IP
addresses, local hostnames, and the name and version of the IRC client. Two
message types in particular, DCC and CTCP, can't be sufficiently anonymized
without changes to the protocols or to IRC client/server code, so they are
completely blocked, except for CTCP ACTION (the message emitted by the
/me command) which isn't inherently dangerous.

I2P's IRC filtering may not cover every possible leak — users should also
check if their client is sending their real name or local username. Packet
sniffers such as Wireshark are
useful here. Eliminating remaining leaks may be as simple as changing the
client's default configuration. If that doesn't help, inform the I2P
developers; they may be able to solve it via additional filtering.

Jetty —
Lightweight web server and Java servlet container. I2P is tightly
integrated with a bundled copy of Jetty which by default is configured to
host the user's eepsite. The bundled
Jetty also serves the I2P router console and web applications bundled with
I2P.
[bundled, standalone]